Focus Group 1B Cybersecurity Dr. Bill Hancock, CISSP Cable and Wireless America FG1B Chair 972-740-7347.

Slides:



Advertisements
Similar presentations
B EST P RACTICES T UTORIAL 2/13/2014 K. F. Rauscher 1 IEEE Communications Society Technical Committee on Communications Quality & Reliability (CQR) PSAP.
Advertisements

AIMS (Administration Information Management System) Status Report ITPWG: February 3-5, 2003 World Intellectual Property Organization.
Homeland Security at the FCC July 10, FCCs Homeland Security Focus Interagency Partnerships Industry Partnerships Infrastructure Protection Communications.
Khammar Mrabit Director Office of Nuclear Security
Nadia Konzali Project Coordinator, COSCAP-GS
Cloud computing security related works in ITU-T SG17
1 Focus Group 2.B2 Network Reliability - Data Reporting & Analysis for Packet Switching NRIC V Council Meeting - October 30, 2001 Paul Hartman, Beacon,
A A A N C N U I N F O R M A T I O N T E C H N O L O G Y : IT OPERATIONS 1 Problem Management Jim Heronime, Manager, ITSM Program Tanya Friehauf-Dungca,
David A. Brown Chief Information Security Officer State of Ohio
The French approach to CIIP ENISA workshop. Coordination of CIP in France ANSSI 2 A cross-ministerial issue The General Secretariat for Defense and National.
National Protection and Programs Directorate Department of Homeland Security The Office of Infrastructure Protection Cybersecurity Brief [Date of presentation]
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Geneva, Switzerland, 4 December 2014 ITU-T Study Group 17 activities in the context of digital financial services and inclusion: Security and Identity.
TIPHON IP Telephony Implementation Association TIPIA Overview Ayse Dilber, Michael Blaschitz TIPIA Vice-Chair, TIPIA Chair
Stephen S. Yau CSE , Fall Security Strategies.
GSA Expo 2009 Impact of Secure Flight Program on DoD Travel Mr. George Greiling GSA Expo June 2009.
The 22 nd meeting of the INTOSAI Working Group on IT Audit (WGITA) KPI Project Final Report — Key Performance Indicators Methodology for Auditing IT Programs.
Review of Power Blackout on Telecom P. J
Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All ITU-T Focus Group on Cloud Computing Olivier Colas, ITU-T FGCC Vice-Chairman Document No: GSC16-PLEN-45.
Federal Communications Commission Communications Security, Reliability and Interoperability Council Working Group 6 – Best Practice Implementation Stacy.
SEC835 Database and Web application security Information Security Architecture.
Focus Group 1B Cybersecurity Dr. Bill Hancock, CISSP, CISM Cable & Wireless FG1B Chair
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
1 Introduction to Information Security. 2 Historical aspects of InfoSec Critical characteristics of information CNSS security model Systems development.
INFORMATION ASSURANCE USING C OBI T MEYCOR C OBI T CSA & MEYCOR C OBI T AG TOOLS.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
Federal Aviation Administration Federal Aviation Administration 1 Presentation to: Name: Date: Federal Aviation Administration AMHS Security Security Sub-Group.
Industry Collaboration to Achieve Network Security The Network Reliability and Interoperability Council Jeffery M. Goldthorp Chief – Network Technology.
International Cyber Warfare and Security Conference Cyber Defence Germany's Analysis of Global Threats 19th November 2013, Ankara.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Internet Emergency Preparedness WG (ieprep) Agenda Monday, August 1, ============================== Chair(s): Scott Bradner Kimberly King AGENDA:
Focus Group 1B Cybersecurity Dr. Bill Hancock, CISSP Cable and Wireless America FG1B Chair
Steering Committee Working Group 6 Best Practice Implementation October 7, 2010 Stacy Hartman Steve Malphrus Co-Chairs.
December 6, 2002 M. Roden / D. Dautel FOCUS GROUP 1C Public Safety Report to NRIC VI Council December 6, 2002 Co-Chairs Mike Roden - Cingular Wireless.
Disaster Recover Planning & Federal Information Systems Management Act Requirements December 2007 Central Maryland ISACA Chapter.
1 NASTD 34 TH ANNUAL CONFERENCE James Arden Barnett Jr., Rear Admiral (Ret.) Chief, Public Safety and Homeland Security Bureau Federal Communications Commission.
Note1 (Admi1) Overview of administering security.
Computer Concepts 2014 Chapter 10 Information Systems Analysis and Design.
Presentation to Public Utility Commission of Texas October 24, 2002 ATIS and the OBF Informational Presentation prepared for the Public Utility Commission.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
Working Group 3: Emergency Alert Systems Status Update December 3, 2015 Kelly Williams, Co-Chair National Association of Broadcasters Steve Johnson, Co-Chair.
2 Gordon Barber March 14, 2003 Focus Group Committee Chairs F Cable: John Thrower (Cox Communications) F CLECs: Robert Smith (McLeod USA) F Equipment.
Collaboration & Transformation Special Interest Group Information Sharing Committee Observations August 2011.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Working Group 6: Secure Hardware and Software – Security by Design Status Update December 3, 2015 Joel Molinoff, Co-Chair (CBS) Brian Scarpelli, Co-Chair.
GSC9_011 Bill McCrum Executive Secretary TSACC Since GSC 8.
National Telecommunications and Information Administration Edward M. Davison Deputy Associate Administrator Office of Spectrum Management National Telecommunications.
H OMELAND S ECURITY P HYSICAL S ECURITY (Focus Group 1A) Update to Council September 15, 2003 K ARL F. R AUSCHER Chair Homeland Security Physical Security.
Rural Ohio Technology Infrastructure Group All Transportation Counts Conference October 8, 2003.
Control and Security Frameworks Chapter Three Prepared by: Raval, Fichadia Raval Fichadia John Wiley & Sons, Inc
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
Lecture1.1(Chapter 1) Prepared by Dr. Lamiaa M. Elshenawy 1.
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Overview of National Infrastructure Protection CHAPTER 3.
CSC4003: Computer and Information Security Professor Mark Early, M.B.A., CISSP, CISM, PMP, ITILFv3, ISO/IEC 27002, CNSS/NSA 4011.
HHS Security and Improvement Recommendations Insert Name CSIA 412 Final Project Final Project.
ITU Perspective: The ITU Development Sector and the Information Society Désiré Karyabwite IP Coordinator / E-STrategies International Telecommunication.
CMGT 411 Week 5 DQ 1 What are some of the challenges facing companies when trying to implement wireless security? How does this affect their security frameworks?
ITU-T Focus Group on Cloud Computing
ITU PLENIPOTENTIARY CONFERENCE GUDALAJARA - MEXICO October 2010
CMGT 431 Education for Service/tutorialrank.com
CMGT 431 STUDY Education for Service- -cmgt431study.com.
Focus Group 1B Cybersecurity Dr. Bill Hancock, CISSP, CISM
Focus Group 1B Cybersecurity Dr. Bill Hancock, CISSP, CISM
Focus Group 1B Cybersecurity Dr. Bill Hancock, CISSP, CISM
IS4550 Security Policies and Implementation
IP and NGN Projects in ITU-T Jean-Yves Cochennec France Telecom SG13 Vice Chair Workshop on Satellites in IP and Multimedia - Geneva, 9-11 December 2002.
Master Data Conversion
IEEE IETF Liaison Report
ITU PLENIPOTENTIARY CONFERENCE GUDALAJARA - MEXICO October 2010
Presentation transcript:

Focus Group 1B Cybersecurity Dr. Bill Hancock, CISSP Cable and Wireless America FG1B Chair

Charter of FG1B Cybersecurity Generate Best Practices for cybersecurity –Telecommunications sector –Internet services Deliverables –December 2002 – prevention –March 2003 – restoration New team, very little previous material to use for a base or as a guideline

Composition and Organization Made up predominantly of Chief Security Officers or equivalent at most telecom companies in the U.S. as well as selected Subject Matter Experts (SMEs) Members include various U.S. Government agencies such as DoC, DoD, DoJ, FCC, Federal Reserve, etc. Group is divided into 10 working teams, each with a team leader

Working Efforts Focus is on “gap filling” for cybersecurity Best Practices (BP) –Find and use existing BPs for cybersecurity –Identify where there are gaps in completeness –Create master list of existing BPs 75+ focus areas identified in initial meetings Each team meets at the same time each week via conference call Working BPs are entered into an agreed-upon template that all teams use There is a process in-place to collect, share and provide documents between team members

Network Security Framework (Based on Bell Labs model) Access Management Infrastructure Security Application Security Service Security End User Plane Control Plane Management Plane THREATS VULNERABILITIES 8 Security Dimensions ATTACKS Data SecurityCommunication SecurityIntegrityAvailabilityPrivacy Interruption Fabrication Interception Modification Authentication Non-repudiation * Proposed to the ITU as a standard.

FG1B Cybersecurity Teams Fundamentals Transport OAM&P (operations, administration, maintenance and provisioning AAA (authentication, accounting, audit) Services Personnel Users Architecture Incidents

Application Security Service Security Infrastructure Security End- User Plane Control Plane Mgmt Plane Personnel OAM&P Services Users Transport Apply to all: AAA Fundamentals Architectures Incidents Security Framework Mapping

FG1B Project Management First consolidation of BPs is in mid October First major edit process in early November Final assembly for FG1B cybersecurity prevention deliverable in mid November Deliverable for cybersecurity prevention on December 6, 2002 Edit process for FG1B restoration in January 2003 Deliverable for cybersecurity restoration in March 2003

Expectations on Deliverables Cybersecurity technologies are being implemented to varying degrees BPs identified will be evaluated for factors affecting implementation BPs will recommend “what”, not “how” to implement BPs for cybersecurity